In our intended system, we assure that the users’ information is safe by “implementing a system which provides security mechanisms by offering three levels of security”. Concerning about the data security part, our system is divided mainly into three modules named “ip triggering” module, “client-authentication” module and “redirection” module. The system generates a user password and a key which is used for client authentication.
The algorithm generates a password and a key of 8 bit length consisting of combinations of characters, special characters, as well as numbers.
Questions may arise as why do we use keys of 8 bit length only? The purpose of our system is to prevent illegal data access if the users’ credential are compromised. By testing against weak algorithms which are easier to crack we design our system to be more robust.

x

Hi!
I'm Kyle!

Would you like to get a custom essay? How about receiving a customized one?

Check it out